Static task
static1
Behavioral task
behavioral1
Sample
ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef.exe
Resource
win10v2004-20230915-en
General
-
Target
f874356ddee152fcdb366283fbb70d86.bin
-
Size
524KB
-
MD5
4cada9f2d3f74ec27ae50fa4a1bd0594
-
SHA1
1cc0947a5a8506d17df8b65c304329506a6938b4
-
SHA256
3bb1a5ad396e6d2ec3515d022e9fde7fc0072d9ee955bef266103b754904dade
-
SHA512
f5570441a926fa102d709823d0fbb74bd9e5803f2a54567accbbe305511d4e1e32c68a5f1b7db0bcbf5aaba3713bba458f866daae4369634e323cf2542ff1b36
-
SSDEEP
12288:VzNRbGwd3E7slZ93UzCE2b0wXfm631Nd0m+Rb8fsst7bysvw:VzNRnNE7WZ0kpD6N+su1o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef.exe
Files
-
f874356ddee152fcdb366283fbb70d86.bin.zip
Password: infected
-
ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef.exe.exe windows:4 windows x86
Password: infected
c1026f3bc4dbd1c7779566798486c792
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetTickCount
RtlFillMemory
advapi32
CryptAcquireContextW
CryptDeriveKey
msvbvm60
_CIcos
_adj_fptan
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaLenBstr
__vbaStrVarMove
__vbaFreeVarList
_adj_fdiv_m64
ord698
__vbaStrErrVarCopy
_adj_fprem1
__vbaStrCat
__vbaSetSystemError
__vbaRecDestruct
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryDestruct
__vbaObjSet
ord595
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
__vbaRefVarAry
__vbaBoolVarNull
_CIsin
__vbaErase
__vbaVarCmpGt
__vbaVarZero
__vbaChkstk
ord526
EVENT_SINK_AddRef
DllFunctionCall
__vbaRedimPreserve
_adj_fpatan
__vbaRedim
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord713
_adj_fprem
_adj_fdivr_m64
ord607
ord608
__vbaFPException
__vbaStrVarVal
__vbaUbound
__vbaVarCat
ord644
_CIlog
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaI4Str
__vbaVarNot
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaI4Var
__vbaVarAdd
__vbaAryLock
__vbaVarDup
__vbaVarCopy
ord616
_CIatan
__vbaCastObj
__vbaStrMove
_allmul
__vbaLenVarB
_CItan
__vbaAryUnlock
_CIexp
__vbaI4ErrVar
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 488KB - Virtual size: 484KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 248KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ